Typical rogues are annoying, but relatively easy to take care of. Previously, all you had to do was boot into safe mode with networking and remove the files and registry entries (or install Webroot). Support forums everywhere use safe mode with networking as the “go to” mode for virus removal as non-core components are not loaded at start up and it’s easier to isolate problems. In the vast majority of the rogues we see, they are not loaded in the few modules which start up in safe mode. Antivirus System does, however, and it also applies some new and improved social engineering tactics to fool you into thinking it’s a real program trying to help you.

Most experienced users would immediately go into safe mode with networking after seeing this. This won’t work, as the rogue is attached to the explorer shell, which is a module loaded in safe mode, and it will lock you down after you launch any executable (regedit, task manager, standalone virus removal tools, ect.). This is probably the point where most people have run out of options and consider taking their PC to a 3rd party technician where you’ll likely pay double the ransom cost of the Rogue. There is no need to do this as there are plenty more tricks to get around these rogues.

Boot into Safe mode with Command Prompt (doesn’t launch explorer shell)The first screen that comes up is cmd.exe, type: “control nusrmgr.cpl” to launch the user account screenOn the user account screen click on “Manage another account”On the Manage Account screen click on “Create new account”Call this account whatever you want and then create the account (just make sure it has administrator privileges)Reboot the computer and then log into that new account (safe mode or normal mode)This new account won’t have those policies the virus created and you should be able to use this account freely You can install Webroot to scan and remove the virus, or you can just delete the files and registry entries associated:DELETE:C:\Users\All Users\pavsdataC:\Users\All Users\pavsdata\21.4.exeC:\Users\All Users\pavsdata\app.icoC:\Users\All Users\pavsdata\cache.binC:\Users\All Users\pavsdata\support.icoC:\Users\All Users\pavsdata\uninst.icoC:\Users\All Users\pavsdata\vl.binC:\ProgramData\pavsdataC:\ProgramData\pavsdata\21.4.exeC:\ProgramData\pavsdata\app.icoC:\ProgramData\pavsdata\cache.binC:\ProgramData\pavsdata\support.icoC:\ProgramData\pavsdata\uninst.icoC:\ProgramData\pavsdata\vl.binHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “avsdsvc” = “%CommonAppData%\pavsdata\21.4.exe /min”MODIFY:[HKEY_CLASSES_ROOT\.exe\shell\open\command]Default=”C:\\ProgramData\\pavsdata\\21.4.exe\” /ex \”%1\” %*to[HKEY_CLASSES_ROOT\.exe\shell\open\command]Default=”%1\” %*